2012
DOI: 10.1007/978-3-642-30157-5_71
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Study of Image Forgery and Copy-Move Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…The key feature of digital image cloning is that, because the copied area is selected from the picture itself, the texture, the noise components and color patterns are perfect with the remaining image. Hence, it is not simple to identify the forgery parts [11], [12]. Additionally, there may be post-processing operations which could possibly make the exposing method harder.…”
Section: Figure1-2 Example Of Copy-move Image Forgerymentioning
confidence: 99%
“…The key feature of digital image cloning is that, because the copied area is selected from the picture itself, the texture, the noise components and color patterns are perfect with the remaining image. Hence, it is not simple to identify the forgery parts [11], [12]. Additionally, there may be post-processing operations which could possibly make the exposing method harder.…”
Section: Figure1-2 Example Of Copy-move Image Forgerymentioning
confidence: 99%
“…Sridevi, M.et al [6] surveys different types of image forgeries. This survey has been done on existing forgery detection techniques for images and also highlights some copymove forgery detection methods based on their complexity.…”
Section: Related Workmentioning
confidence: 99%
“…Digital image forgery detection has been growing very fast in the recent years as research domain [5]. Mainly, the digital image forgery is classified in to two categories: copy move forgery or cloning and splicing [6]. In copy move forgery, some content of image is copied and pasted somewhere else in the same image to hide the important information as shown in Fig.…”
Section: Introductionmentioning
confidence: 99%
“…Active approach embeds data or digital signature into original images via pre-processing, thereby limiting its practical applications. Numerous digital images exist in the Internet without any prior information or digital signature and watermark [4].…”
Section: Introductionmentioning
confidence: 99%